Information security culture: A management perspective, Computers & Security, vol.29, issue.4, pp.476-486, 2010. ,
DOI : 10.1016/j.cose.2009.10.005
Understanding Information Security Culture: A Conceptual Framework, Proc. ISSA, pp.1-10, 2006. ,
A conceptual framework for cybersecurity awareness and education in SA, South African Comput. Journal, vol.52, issue.2014 52, pp.29-41, 2014. ,
A cyber-security culture research philosopy and approach to develop a valid and reliable measuring instrument, SAI Computing Conference 2016, p.10, 2016. ,
From Information Security to Cyber Security Cultures Organizations to Societies, Information Security for South Africa (ISSA), pp.1-7, 2014. ,
DOI : 10.1109/issa.2014.6950492
Towards an Education Campaign for Fostering a Societal , Cyber Security Culture, Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, pp.2014-174, 2014. ,
An Ontology for a National Cyber-Security Culture Environment, Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, pp.2015-2016, 2015. ,
Organizational culture and leadership, 1992. ,
Information security culture ? from analysis to change, Security in the Information Society, pp.191-201, 2002. ,
Inquiring Systems and Problem Structure: Implications for Cognitive Development, Human Development, vol.26, issue.5, pp.249-265, 1983. ,
DOI : 10.1159/000272887
The structure of ill structured problems, Artificial Intelligence, vol.4, issue.3-4, pp.181-201, 1973. ,
DOI : 10.1016/0004-3702(73)90011-8
Concepts, Structures, and Goals: Redefining Ill-Definedness, Int. J. Artif. Intell. Educ, vol.19, issue.3, pp.253-266, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00702995
Cognition and thought, 1965. ,
On the solving of ill-structured problems, The nature of expertise, 1988. ,
A model for solution of ill-structured problems: Implications for everyday and abstract problem solving, 1989. ,
A secondary analysis of claims regarding the reflective judgment interview: Internal consistency, sequentially and intra-individual differences in ill-structured problem solving, Annual Meeting of the American Educational Research Association, 1994. ,
The IDEAL problem solver: A guide for improving thinking, learning, and creativity, 1983. ,
Human problem solving, 1972. ,
Well-structured and Ill-structured, " The Pennsylvania State University, 1998. ,
Content Analysis: An introduction to its methodology, 2004. ,
Content analysis: Method, applications, and issues, Health Care for Women International, vol.15, issue.3, pp.313-321, 1992. ,
DOI : 10.1097/00006199-199103000-00014
How to plan and perform a qualitative study using content analysis, NursingPlus Open, vol.2, pp.8-14, 2016. ,
DOI : 10.1016/j.npls.2016.01.001
Health and qualitative analysis methods, " in Qualitative research, methods in the service of health, pp.13-25, 2000. ,
Qualitative, research & evaluation methods. California, 2002. ,
Cybersecurity culture as an element of IT professional training, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), pp.205-210, 2016. ,
DOI : 10.1109/DIPDMWC.2016.7529390
Practise what you preach, Computer Fraud & Security, vol.2016, issue.4, pp.5-8, 2016. ,
DOI : 10.1016/S1361-3723(16)30035-5
The Security Culture of a Global and Multi-levelled Cybersecurity Cyber- Development, Cyber-Democracy Cyber-Defense Challenges, Oppor. Implic. Theory, vol.9781493910, pp.113-116, 2014. ,
From Information Security to Cyber Security Cultures Organizations to Societies, Information Security for South Africa (ISSA), pp.1-7, 2014. ,
DOI : 10.1109/issa.2014.6950492
Fostering a cyber security culture: a case of South Africa, Proceedings of the 14th Annual Conference on World Wide Web Applications, 2012. ,
Nineteen national cyber security strategies, International Journal of Critical Infrastructures, vol.9, issue.1/2, pp.3-31, 2013. ,
DOI : 10.1504/IJCIS.2013.051608
Why people are key to cyber-security, Network Security, vol.2016, issue.6, pp.9-10, 2016. ,
DOI : 10.1016/S1353-4858(16)30057-5
A Framework for Cyber Security in Africa, Journal of Information Assurance & Cybersecurity ,
DOI : 10.5171/2012.322399
A National Strategy for an Effective Cybersecurity Approach and Culture, 2010 International Conference on Availability, Reliability and Security, pp.370-373, 2010. ,
DOI : 10.1109/ARES.2010.119
The urgent need for an enforced awareness programme to create internet security awareness in nigeria, Proceedings of the 17th International Conference on Information Integration and Web-based Applications &Services, iiWAS '15, pp.1-7, 2015. ,
DOI : 10.1145/2538862.2538990
Creating a culture of enterprise cybersecurity, Int. J. Bus. Anthropol, vol.2, issue.2, pp.36-47, 2011. ,